 Research
 Open Access
 Published:
A passenger risk assessment method based on 5GIoT
EURASIP Journal on Wireless Communications and Networking volume 2021, Article number: 5 (2021)
Abstract
For the airports worldwide, it is important to establish a "passenger integrity system" based on the basic information of passengers and their related credit system. Correspondingly, this paper develops a new risk assessment model for the passenger graded security check by introducing several new technologies to obtain the passengers’ realtime status information as well as historical data. We first propose to deploy a variety of 5GIoT devices to monitor the passengers in real time, including highdefinition cameras, millimeterwave security detectors, etc. We then rely on machine learning to analyze the passenger risk level and integrate improved analytic hierarchy process (AHP) with group decision theory, namely GDAHP. According to the risk level, the passengers can be classified into known, ordinary and dangerous targets. The differentiated handling of different targets could significantly save the time of security check and improve the passenger experience.
Introduction
The airports around the world have been enthusiastic to improve security efficiency by applying new security technologies [1]. Iris, facial and fingerprint identification are in use at some airports of the USA to improve security efficiency. In November 2016, Chicago's O'Hare Airport opened two automatic security channels, which use advanced equipment such as millimeterwave security detector to realize the transformation of many functions from manual operation to automated operation and reduce the security check time by about 30% while improve the security check effect [2]. Smart Lane, an intelligent security channel used in the UK airports, has realized automatic tray return mode and remote image interpretation, which greatly saves labor costs and improves security efficiency [3]. Shenzhen Airport adopts the "passenger differential security check mode," when the gate system at the security check site collects all kinds of key personnel information from the cloud platform of civil aviation public security information. After systematic evaluation, passengers are classified and treated with different levels of check standards according to their types, effectively improving the efficiency of security check [4].
The fifth generation (5G) mobile network is the latest breakthrough to meet the demands of modern society for highspeed wireless networks [5,6,7]. The performance goals of 5G are high data rate, reduced latency, energy saving, cost reduction, system capacity increase and largescale equipment connection. Some technologies for 5G have emerged at the c moment, such as millimeterwave, largescale multiinput multioutput and small cellular communication. The IoT consists of a network of physical devices connected with remote computational capabilities. IoT deals with low power devices which interact with each other through the Internet. The IoT services will provide technical support in areas such as smart cities, smart grids and smart homes, thereby increasing productivity, reducing costs and significantly improving people's daily lives.
The development and applications of 5G and Internet of things (IoT) have provided technical support for the intelligent construction of airport security, which is also the focus of this paper. At present, most airports upgrade their security system with new technologies such as millimeterwave security detector, biometric identification or passenger risk assessment based on large data of civil aviation passengers. However, these technologies are usually used in isolation without effective combination. This paper proposes a new mode of airport graded security check, which combines a variety of new security technologies with large data of civil aviation passengers, carries out comprehensive risk assessment of passengers. In the passenger information collection stage, the IoT terminals are used to obtain the realtime passenger data, mainly including the highprecision surveillance cameras and millimeterwave security detectors. In addition, these equipments are connected with the 5G wireless interfaces to achieve high speed and low latency transmission.
When it comes to security and risk assessment, the following research findings should be highlighted. Reference [8] introduced a formal threat screening game (TSG) model. The Security Risk Assessment Handbook [9], as well as the ISO 310002018 [10], supplies wideranging coverage that includes security risk analysis, mitigation and risk assessment reporting and provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. And the AHP method mentioned in our paper is one of the classical risk assessment algorithms. Reference [11] evaluates, for the US case, the costs and benefits of three security measures designed to reduce the likelihood of a direct replication of the 9/11 terrorist attacks and discusses the balance between economic input and the effectiveness of security measures, which has some inspiration for our research.
Passenger risk assessment is a complex decisionmaking process and serves as the premise of graded security check. However, due to the subjectivity of qualitative evaluation, the limitations of some statistical methods and the interference of many external factors which cannot be quantitatively described, passenger risk assessment has great ambiguity and uncertainty [12]. AHP has been widely used in the establishment of risk assessment model and the determination of index weight because of its concise and intuitive principle and wide practicability. The traditional AHP method uses 1–9 scale to obtain the judgment matrix and then calculates the weight. Although concise, it has strong subjectivity and is prone to problems such as the inverse order of thinking results and the disjunction of consistency between thinking and judgment matrix [13, 14]. For this reason, many scholars have improved the AHP method and put forward many scaling systems [15,16,17,18]. Lv [19] made a systematic comparative analysis of various scales and concluded that the index scales could solve the problem of the disconnection between the judgment matrix and the consistency of thinking, and it was a good and reliable scale.[20, 21]. Other authors have used a version of AHP and group decision as well [22]. In this paper, an AHP method based on index interval scale is proposed, which combines index scale with interval scale effectively. Meanwhile, group decisionmaking theory is introduced to construct a judgment matrix through multiple experts to eliminate the judgment bias caused by personal preferences. It is applied to civil aviation passenger risk assessment to make the evaluation results more scientific and reliable.
Machine learning is one of the most important breakthroughs in the field of artificial intelligence, such as speech recognition, computer vision, video analysis and multimedia [23]. In this paper, we employ machine learning to perform face recognition and emotion analysis, in a bid to effectively and efficiently conclude the passenger's risk level.
Expression recognition is similar to face recognition. The difference is that facial recognition uses facial features for face recognition, while facial expression recognition uses facial features to identify types of human emotions. The two systems can be complementary because the facial recognition system recognizes the face owner, and the facial emotion recognition system recognizes the emotion expressed by the facial owner. The biggest difference between deep learning and traditional pattern recognition methods is that it automatically learns features from big data, rather than features designed by hand. The characteristics of manual design mainly rely on the a priori knowledge of the designer, and it is difficult to take advantage of big data. Due to the dependence on manual adjustment of parameters, only a small number of parameters are allowed in the design of features. Therefore, in the airport security inspection, the proposed new system will process the collected face information and use machine learning to perform face recognition and emotion analysis to evaluate the passenger's risk level.
The remainder of this paper is organized as follows. Section II introduces the new security check system. Three new security technologies based on 5G technology and machine learning are introduced, including face recognition, millimeterwave security detector and emotional analysis. Section III examines the improved AHP method based on group decision. Section IV proposes the new model of graded security check. In Section V, four cases are given to illustrate the results of passenger security risk assessment under different circumstances and methods. Finally, Section VI concludes the paper.
A novel design of security check system
The proposed novel design of security check system is mainly composed of three technologies, including facial recognition, millimeterwave human security detector and potential emotion analysis. The proposed solution combines three new technologies with big data of civil aviation passengers to conduct risk assessment on passengers and adopt different security procedures for passengers with different risks. Ultimately, the goal of improving airport security inspection efficiency and resource utilization, and saving passengers' time will be facilitated.
Security check system at airports
One of the duties of civil aviation security checks is to carry out safety check on passengers and their luggage, including four links: certificate check, personal check, checkin of carryon luggage and checked luggage [24]. Figure 1 shows the routine procedures of passenger checkin, security check and boarding. It can be seen that the routine security check process uses the same check steps for all passengers, resulting in long waiting time and low efficiency. If we use a variety of new security technologies and large data analysis of civil aviation passengers, classify passengers through risk assessment, use limited security resources for highrisk passengers and simplify the security check process for some lowrisk "frequent passengers," we can improve security check efficiency and improve passenger travel experience under the condition of controllable risk.
Figure 2 shows the schematic diagram of a passenger information recognition system based on a variety of new security technologies. The hardware of the system is usually placed inside the terminal building. Based on three new security technologies: face recognition, throughtype millimeterwave human body security detector and potential emotional analysis, millimeterwave human body security channel and face recognition camera are set in the relevant area before passengers enter the conventional security channel to capture the whole body millimeterwave radar image and face image information of passengers from different angles. The above information is tested, identified and analyzed to realize passenger risk classification and risk information warning. The basic functions of three new security technologies are described below.
5GIoTbased new security technologies
The basics of 5G and IoT
5G mobile communication has many characteristics such as high speed, large capacity and low latency. In the IoT, highquality and realtime video data transmission is often required. Especially in the 5G communication system, many IoT terminal devices will play an important role, such as autonomous driving or a surveillance system with a highdefinition camera. Due to the heterogeneity of equipment and services, a multilayer architecture will be adopted in 5G networks. The emergence of 5G technology is related to the demand for connection between people and devices, so new technologies and new services that can meet such largescale connection traffic needs are needed. The key technologies currently involved in 5G include machinetomachine communication, devicetodevice communication (D2D), cloud computing, millimeterwave communication and IoT [25].
IoT is a potential technology that intends to realize the interconnection of all things. With the development of technology, the popularity of small and inexpensive computing devices with sensing and communication functions is paving the way for the widespread application of IoT technology [26, 27].
In the system of this paper, we deploy highprecision cameras and millimeterwave detectors at the airport as IoT terminals to monitor airport passengers in real time, and transmit data through 5G communication channels to realize face monitoring and dangerous goods recognition.
Face recognition cameras and millimeterwave security detector
Face recognition system uses face detection, tracking and recognition algorithm, through a reasonable layout of face recognition cameras, when passengers enter and exit the millimeterwave human body security channel, face capture and recognition are carried out. By connecting with the database of public security license and identity information resources, the fugitive criminals can be charged in advance and warned in real time, grasp the dynamics in real time and quickly lock the suspect's trajectory [28].
By detecting the millimeterwave signal of natural radiation of the human body and personal belongings, the millimeterwave human body security detector can detect and identify hidden dangerous goods quickly, safely and efficiently [29]. The special passageway for human security check is auxiliary equipment used in conjunction with millimeterwave human security instrument. It is 4.5 m in length, 4.5 m in width and 2.8 m in height. It provides a special passageway for large passenger flow. It does not touch or interfere with human behavior, and can simultaneously detect a variety of metals and nonmetals, and identify all kinds of dangerous goods, such as guns, ammunition, explosives and knives.
Machine learningbased new security technologies
The basics of emotion analysis technology
The face is the information most used to identify the human body. At the same time, the face is also an important medium for expressing a person's mental state and a vital way to spread human emotional information and coordinate interpersonal relationships. Facial expression recognition is an important part of face recognition technology [30]. In recent years, it has received extensive attention in the fields of human–computer interaction, security, robot manufacturing, automation, medical, communication and driving, and has become a hotspot in academia and industry.
Although latent emotion analysis technology still uses image processing technology, it is different from face recognition in that it extracts the movement of facial muscles. Potential emotions are usually spontaneous movements controlled by vestibular organs. Therefore, the subtle movements of muscle groups can be used to judge the potential emotions of target people and to some extent reveal the psychological activities of people [31]. Potential emotional analysis system can use the face image captured by face recognition system to acquire and analyze the emotional state (aggressiveness, tension and pressure) of each target face, calculate its risk level comprehensively and use it for subsequent risk assessment. At the same time, it can capture the face image beyond the warning value and display the results on the screen through numbers and colors.
Machine learningbased facial expressions recognition
Machine learning is an important concept in the field of artificial intelligence. It has achieved great success in many fields such as speech recognition, natural language processing, computer vision, image and video analysis and multimedia. Deep learning plays a very important role in the field of object recognition, in which face recognition is an important breakthrough. The biggest challenge of face recognition is how to distinguish between intraclass changes caused by factors such as light, posture and expression and interclass changes caused by different identities. These two types of change distributions are nonlinear and extremely complex, and traditional linear models cannot effectively distinguish them. The purpose of deep learning is to obtain new feature representations through multilayer nonlinear transformation.
Convolutional neural network (CNN) is the most commonly used deep learning method in face recognition and emotion analysis. The main advantage of the deep learning is that it can be trained with a large amount of data [32]. This method does not need to design specific features that are robust to different types of intraclass differences (such as lighting, posture, facial expressions and age), but can learn them from the training data. The main shortcoming of deep learning methods is that they need to use very large data sets for training, and these data sets need to contain enough changes so that they can be generalized to unseen samples. Fortunately, some largescale face data sets containing natural face images have been published and can be used to train CNN models. Therefore, in airport scenarios, using machine learning to carry out face recognition and emotion analysis on passengers has practical significance.
Improved AHP method based on group decision
In this part, the improved AHP method based on group decisionmaking is described in detail, called the GDAHP method. First, the index interval number scaling method is introduced, and then, the calculation method of expert weight and the establishment process of expert group decisionmaking matrix are given.
Exponential interval scaling method
Weber–Fechner's law [33, 34] holds that psychological quantity is a logarithmic function of external stimulus, that is, when the stimulus intensity increases in geometric series, the intensity of sensation increases in arithmetic series. According to this theorem, if the importance degree of index ai relative to aj is divided into nine grades, which are "equal important," "slightly important," "obvious important," "very important," "extremely important" and their intermediate grade, respectively, and the nine grades are described, respectively, by integers t = 0–8, then is the relationship between aij, the objective importance ratio of index ai to aj, and t is
where c is the ratio constant of importance degree of two adjacent levels and t = 0, ± 1, ± 2, …, ± 8. It is generally believed that it is appropriate to use 9 as the limit of the ratio of importance of two factors, i.e., the expression of "extreme importance." Then, we get \(c = \sqrt[4]{3} \approx 1.316\) from a_{ij} = c^{8} = 9.
The exponential scaling method can achieve consistency with the thinking judgment, but the comparison judgment result is still a definite value. In order to adapt to the fuzziness and randomness of the evaluation process, interval numbers are used to quantify people's subjective judgments. At this time, all elements in the judgment matrix are exponential interval numbers.
\(\tilde{\varvec{A}} = \left( {\tilde{a}_{ij} } \right)_{n \times n}\) is called the interval matrix based on exponential scaling (i.e., exponential interval number matrix), if the following are satisfied:

1.
\(\tilde{a}_{ij} = \left[ {a_{ij}^{L} ,a_{ij}^{R} } \right]\), where \(\tilde{a}_{ij }\) is the interval matrix, \(a_{ij}^{L}\) and \(a_{ij}^{R}\) both exponential scales, \(a_{ij}^{L} = c^{{t_{ij}^{L} }}\), \(a_{ij}^{R} = c^{{t_{ij}^{R} }}\);

2.
\(\tilde{a}_{ii} = \left[ {1,1} \right]\);

3.
\(\tilde{a}_{ji} = \frac{{\left[ {1,1} \right]}}{{\tilde{a}_{ij} }} = \left[ {\frac{1}{{a_{ij}^{R} }},\frac{1}{{a_{ij}^{L} }}} \right]\);
then \(\tilde{\varvec{T}} = \left( {\tilde{t}_{ij} } \right)_{n \times n}\) is the subjective sensory judgment matrix corresponding to \(\tilde{\varvec{A}}\), where \(\tilde{t}_{ij} = \left[ {t_{ij}^{L} ,t_{ij}^{R} } \right]\), \(\tilde{t}_{ii} = \left[ {0,0} \right]\), and \(\tilde{t}_{ij} =  \tilde{t}_{ji}\).
In order to keep the level of ambiguity in judgment consistent, the interval width of each element in \(\tilde{\varvec{T}}\) is set to 2, i.e., \(t_{ij}^{R}  t_{ij}^{L} = 2\), then the corresponding index interval values are obtained as \(\left[ {c^{t  1} ,c^{t + 1} } \right]\), in which \(t = 0,1,2,3, \ldots ,8\). The corresponding relationship between index interval scales and natural language descriptions is shown in Table 1.
From Table 1, we can see that the greater the difference of importance levels, the greater the distance between the scale intervals, the greater the uncertainty of the scale, which conforms to the rule of human thinking. The weights of each index are the average and standardized values of all elements in the row corresponding to the judgment matrix.
Calculation of expert weight
In the actual evaluation, a single expert often cannot fully reflect the objective facts. Therefore, it is necessary to synthesize the opinions of multiple experts, which leads to the problem of group decisionmaking. The process of group decisionmaking is to unify the differences of expert opinions and minimize the inconsistency between the results of group decisionmaking and individual preferences [35, 36].
Setvalued statistics is an effective way to deal with uncertainty evaluation index. The evaluation index set of the evaluation system is defined as \({\varvec{X}} = \left\{ {x_{1} ,x_{2} , \ldots ,x_{r} , \ldots ,x_{n} } \right\}\), and the assessment experts are \({\varvec{S}} = \left\{ {{\varvec{s}}_{1} ,{\varvec{s}}_{2} , \ldots ,{\varvec{s}}_{r} , \ldots ,{\varvec{s}}_{n} } \right\}\). For each criterion \(x_{r} \left( {x_{r} \in {\varvec{X}}} \right)\), interval estimates given by experts \({\varvec{s}}_{r} \left( {{\varvec{s}}_{r} \in {\varvec{S}}} \right)\) are \(\left[ {\mu_{rk}^{L} ,\mu_{rk}^{ R} } \right]\left( {k = 1,2, \ldots ,m} \right)\), in this way, a \(m\)dimensional setvalued statistical sequence can be formed. Add these \(m\) intervals together, and define \(\mu_{r}^{min} = min_{k = 1}^{m} \left( {\mu_{rk}^{L} } \right)\) and \(\mu_{r}^{max} = man_{k = 1}^{m} \left( {\mu_{rk}^{R} } \right)\), so the \(m\) experts' judgment of the index \(x_{r}\) forms a random distribution on the number axis on the interval of \(\left[ {\mu_{r}^{{min_{r}^{max} }} } \right]\).
where
\(\lambda_{k }\) is the weight of the kth expert and \(\mathop \sum \nolimits_{k = 1}^{m} \lambda_{k} = 1\). According to the above formula, the position of the center of gravity of the random set \(\overline{\mu }_{r}\) can be obtained and used as the comprehensive evaluation value of group decisionmaking of index \(x_{r}\)
The above formula is simplified as
The determined \(\overline{\mu }_{r}\) is the comprehensive evaluation value of index \(x_{r}\) by group decisionmaking after considering the weights of experts.
Expert weights can be indirectly reflected by the judgment matrix constructed by experts, which is embodied in the difference between individual preference information and comprehensive preference information of experts. In order to quantitatively reflect this difference, the deviation degree of the two interval numbers, \(\tilde{a} = \left[ {a^{L} ,a^{R} } \right]\) and \(\tilde{b} = \left[ {b^{L } ,b^{R} } \right]\), is defined as
When establishing the judgment matrix, the judgment interval of the expert \(k\) to index \(x_{r}\) is \(\tilde{\mu }_{rk} = \left[ {\mu_{rk}^{L} ,\mu_{rk}^{R} } \right]\), then the average evaluation interval of all \(m\) experts for the index \(x_{r}\) is as follows
By substituting the above formula into formula (5), the relative deviation \(\delta_{rk}\) between \(\tilde{\mu }_{rk}\) and \(\tilde{\mu }_{r}^{*}\) can be obtained as
For different indicators, the deviation degree of the same expert's evaluation results is different. It is generally believed that there is a consistent trend in the subjective rational judgment of experts, and the generation of inconsistent evaluation matrix can be considered as the result of the interaction of many random disturbances.
Assuming that the relative deviation between the evaluation interval of each index given by expert k and the total weighted evaluation interval of corresponding indexes is \(\delta_{k}\), the following assumptions could be made: when the number of evaluation indexes is infinite, the deviation of each index obeys a normal distribution \(\delta_{k} \sim N\left( {0,\sigma_{k}^{2} } \right)\).
Given parameter \(\mu = 0\), we can obtain the maximum likelihood estimator of \(\sigma_{k}^{2}\), which represents the deviation between expert \(k\)'s judgment and expert group's judgment. The likelihood function is
So, the maximum likelihood estimator of \(\sigma_{k}^{2}\) is
where \(\sigma_{k}^{2}\) reflects the degree of deviation between expert \(k\)'s judgment and expert group's judgment. The smaller the value of \(\sigma_{k}^{2}\), the higher the expert's judgment level, the greater the weight, vice versa. Therefore, the weight of expert \(k\) can be calculated according to the following formula
Establishment of expert group decision matrix
The steps needed to calculate the expert group decision matrix are as follows:

1.
Subjective perception judgment matrix given by experts is \(\tilde{\varvec{T}}_{k} = \left( {\tilde{t}_{ij}^{k} } \right)_{n \times n}\). Since \(\tilde{\varvec{T}}_{k}\) is a reciprocal matrix, only the upper triangular matrix of the matrix (excluding the diagonal elements) can be considered to form a setvalued statistical sequence of evaluation indices with a total number of \(n^{\prime} = n\left( {n  1} \right)/2\).

2.
Calculate the weights of experts. The synthetic evaluation value of group decisionmaking with \(n^{\prime}\) indexes is obtained by formula (4) is \(\overline{\mu }_{1} ,\overline{\mu }_{2} , \ldots ,\overline{\mu }_{r} , \ldots ,\overline{\mu }_{{n^{\prime}}}\).

3.
Taking the \(n^{\prime}\) values as the midpoint, the interval numbers of \(n^{\prime}\) intervals with width of 2 are obtained, which are denoted as.
$$\tilde{\nu }_{r} = \left[ {\overline{\mu }_{r}  1,\overline{\mu }_{r} + 1} \right],$$(11)where \(\tilde{\nu }_{r}\) is called the comprehensive evaluation interval of group decisionmaking with index \(x_{r}\). And each \(\tilde{\nu }_{r}\) is reduced to group decisionmaking judgment matrix \(\tilde{\varvec{T}}^{*} = \left( {\tilde{t}_{ij}^{*} } \right)_{n \times n}\).

4.
Finding expert group decisionmaking matrix \(\tilde{\varvec{A}}^{*} = \left( {\tilde{a}_{ij}^{*} } \right)_{n \times n}\), where
$$\tilde{a}_{ij}^{*} = c^{{\tilde{t}_{ij}^{*} }} ,$$(12)In the formula, the ratio constant of importance is taken as \(c = \sqrt[4]{3}\). The judgment matrix of expert group decisionmaking, \(\tilde{\varvec{A}}^{*}\), is obtained, and the weight of each index can be calculated according to the method of Sect. 3.1
According to the above method, the index weight of each level element in AHP model can be obtained. Assuming that there are m indicators in a hierarchical unit of the AHP model, \(w_{i}^{\left( 0 \right)}\) is the weight of index i in the unit, and \(s_{i}\) is the evaluation value of index i, so the evaluation result of the unit is
Through step by step synthesis, the overall evaluation results can be obtained.
A model of graded security check with cuttingEdge technologies
By adopting the aforementioned new security technologies, this section first presents a novel passenger grading security check process based on risk assessment, followed by our proposed GDAHP method in the second step to assess passenger risk. Finally, we develop the security check efficiency and airport implementation scheme.
Graded passenger security check model based on risk assessment
Figure 3 illustrates the process of graded passenger security check based on risk assessment. First, face recognition technology is used to confirm the identity of the passenger. By comparing the databases, it is clear whether the passenger belongs to the police blacklist of fugitives, and the passenger's flight record and credit record are obtained. Then, by means of the millimeterwave human body security detector and potential emotional analysis technology, the passenger is confirmed whether he carries or has dangerous goods in his checked luggage. The potential emotional states such as aggressiveness, tension and stress are obtained. Based on the passenger history data and realtime status information obtained by the above two steps, the comprehensive risk assessment is carried out. According to the risk level, the passengers are divided into known passengers, ordinary passengers and dangerous passengers, which are handled separately by disposals of fasttrack check, routine check and special attention (Table 2).
Index system and risk assessment method
First, the GDAHP method is applied to civil aviation passenger risk assessment, and then, the graded security check risk index system and the scoring calculation method of single index are given. Finally, the classification criteria of different security check grades are proposed.
Weight calculation of index system
A risk assessment model of civil aviation passengers based on new security technology is established, and the index weights of each level are calculated by this method. The model is divided into two levels. The firstlevel indicators include personnel information (E_{1}), civil aviation passenger information record (E_{2}) and abnormal behavior identification results (E_{3}). Among them, E_{2} has two secondary indicators of civil aviation passenger flight record (E_{21}) and civil aviation passenger credit record (E_{22}), and E_{3} has two secondary indicators, namely through millimeterwave human body security detector (E_{31}) and potential emotional analysis (E_{32}).
The following three indicators at the first level (personnel information monitored by Police, information records of civil aviation passengers and identification results of abnormal behavior) are taken as examples to illustrate the calculation process of weight with the GDAHP method.

1.
By comparing and judging the indicators on the first level, the subjective sensory judgment matrix filled out by six security experts is as follows:
$$\begin{gathered} \begin{array}{*{20}l} {{\text{Expert}}\;{1:}} \hfill & {{\text{Expert}}\;{2:}} \hfill & {{\text{Expert}}\;{3:}} \hfill \\ {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {3,5} \right]} & {\left[ {3,5} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  3,  1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right] } \hfill & {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {3,5} \right]} & {\left[ {4,6} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  1,1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]} \hfill & {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {3,5} \right]} & {\left[ {3,5} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  1,1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]} \hfill \\ {{\text{Expert}}\;{4:}} \hfill & {{\text{Expert}}\;{5:}} \hfill & {{\text{Expert}}\;{6:}} \hfill \\ {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {4,6} \right]} & {\left[ {3,5} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  1,1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]} \hfill & {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {3,5} \right]} & {\left[ {4,6} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  3,  1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]} \hfill & {\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {4,6} \right]} & {\left[ {3,5} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  1,1} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]} \hfill \\ \end{array} \hfill \\ \hfill \\ \end{gathered}$$ 
2.
The expert weights are calculated according to formula (10). The results are shown in Table 3.

3.
Taking the upper triangular elements of the matrix, there are three evaluation indicators, weighted to get the subjective sense judgment matrix of group decisionmaking as follows:
$$\left[ {\begin{array}{*{20}c} {\left[ {0,0} \right]} & {\left[ {3.3425,5.3425} \right]} & {\left[ {3.3240,5.3240} \right]} \\ {} & {\left[ {0,0} \right]} & {\left[ {  1.6194,  0.3806} \right]} \\ {} & {} & {\left[ {0,0} \right]} \\ \end{array} } \right]$$ 
4.
Computing the expert group decision matrix \(\tilde{\varvec{A}}^{*}\) based on formula (12):
$$\left[ {\begin{array}{*{20}c} {\left[ {1,1} \right]} & {\left[ {2.5043,4.3376} \right]} & {\left[ {2.4916,4.3156} \right]} \\ {\left[ {0.2305,0.3993} \right]} & {\left[ {1,1} \right]} & {\left[ {0.6410,1.1102} \right]} \\ {\left[ {0.2317,0.4013} \right]} & {\left[ {0.997,1.5601} \right]} & {\left[ {1,1} \right]} \\ \end{array} } \right]$$ 
5.
Calculate the weight of each index, and the results are as follows (Table 4).
Based on the reality of civil aviation passenger security check with new security technologies, the above process synthesizes the opinions of different experts and quantifies reasonably the consistency of judgment and thinking and the fuzziness of judgment, so it is more scientific and reliable. It can be seen that the importance of personnel information indicators that public security focuses on is significantly higher than the other two indicators, and its weight accounted for 62.3%, and there is no longer a secondary indicator. Face recognition technology is used to compare passenger's face information with the blacklist of police pursuers. Once successful, all item scores are deducted and alarmed.
According to the above method, the weights of other levels in the AHP model can be obtained. Among them, E_{21} and E_{22} are two secondary indicators of expert group decision matrix.
The results show that the secondary weights of the above two secondary indicators are 36.4% and 63.6%, respectively. It can be seen that the importance of the civil aviation passenger credit record index E_{22} is higher than that of the civil aviation passenger flight record index E_{21}, which reflects the high attention paid to passenger credit records.
Similarly, the expert group decision matrix of E_{31} and E_{32} is
The secondary weight of dangerous goods is 75.4%, the highest weighting after E_{1}, showing its importance in the security check evaluation. The emotional status indicator, at 24.6%, is of less importance.
Graded security check risk index system and score calculation
Table 5 shows the first, second and comprehensive weights of the first and second level indexes in the risk assessment index system of civil aviation passenger graded security check. The full score of all the single second level indexes is set to 100, and the cumulative penalty points are calculated according to the standards in Tables 6, 7, 8 and 9, respectively, until the penalty is completed.
The score of E_{21} is deducted according to the standard of Table 6. For passengers who have taken more than 60 flights in 3 years (denoted by N_{pf}), the score of E_{21} is full. t shows that frequent passengers who take more flights are familiar with the requirements of civil aviation security check, which can simplify the requirements of civil aviation security check.
The score of E_{22} is calculated according to the standard of Table 7. The scores of E_{22} are deducted for the different severity of civil aviation passengers' violation of civil aviation regulations, and for the more serious acts, the total score is deducted, where “Others” mean the dishonesty or irregularities of passengers not taken into account.
The score of E_{31} is calculated according to the standard of Table 8. The score is deducted according to the result of detection and identification of the millimeterwave human body security detector. The risk level of guns, ammunition and explosives is the highest. Once found, the total score is deducted.
The score of E_{32} was deducted according to the standard of Table 9, and the score was deducted according to the result of potential emotional analysis. When the analysis results exceed the set threshold, the scores are deducted according to the risk level, and the scores from high to low are aggression, tension and stress.
The scores of all secondary indicators constitute the score vectors G^{1−2}.
Graded security check standard
Based on the weights and corresponding scores of all secondary indicators of security check risk, the total score P of comprehensive risk assessment is obtained by weighting, as follows
where G^{1−2} represents the vector composed of the scores of all secondary indicators and W^{1−2} represents the vector composed of the weights of all secondary indicators. Table 10 gives the classification criteria of known passengers, ordinary passengers and dangerous passengers, and explains the basis of the comprehensive scoring range of each grade.
The criteria of passenger risk classification are mainly based on the following considerations:

1.
Set strict standards for "known passengers." Only those "frequent passengers" who meet the requirements of the number of flights, have good credit records and have not found any abnormal in the passing millimeterwave security detector and potential mood analysis can pass through customs quickly.

2.
Dangerous goods (which can be found by millimeterwave human body security detector) are the second highest risk factor, so if dangerous goods are found, 15.3 points will be deducted, putting the passenger in the dangerous passenger category.

3.
If passengers in the credit record, through millimeterwave human body security instrument, potential emotional analysis and other indicators link, the cumulative score is more than 15 points, the total score is less than 85 points, it will also be divided into "dangerous passengers" for "focus," reflecting the basic principle of "safety first."
Security check efficiency
The passenger information recognition system is set up before routine security checks and carries out risk classification for different passengers. Because the system is suitable for large passenger flow, passengers do not need to stop, and it will not increase the security check time itself. This system can identify and fasttrack low risk passengers to minimize delays for this group, significantly improving the flight experience of this part of the passengers.
According to the rules established in this paper, the proportion of lowrisk passengers is at least 10%, and their security check time is about 30% of the routine security check, which can improve the efficiency of security check to a certain extent. With the continuous use of the system, the proportion of lowrisk passengers will also rise, further improving the efficiency of security checks.
A possible check process is designed as follows: Two gates can be installed in the waiting area. After identification and risk assessment, the passengers hold the ID card or passport at the first gate, so their identity information is read and correlated with their risk assessment results. For frequent passengers with good safety credit, the entry gate will guide them to enter the "fasttrack check" through the second gate. For those passengers with higher risk, the entry gate will guide them into the "routine check" channel or "special check" channel.
At present, facial recognition technology should be sufficient, but even if it fails, it can be compensated for by ID card recognition when passengers pass through the first gate. When it comes to passenger privacy protection, all passenger information identification systems encrypt passenger's personal information. For example, after millimeterwave security detector imaging, cartoon pictures will be used to replace sensitive parts of the human body.
Results and discussion
In this part, four cases are given to illustrate the results of passenger security risk assessment under different circumstances and the corresponding disposal methods.
Case 1: Known passengers
As shown in Table 11, the passenger has taken more than 60 flights in 3 years, belonging to "frequent passengers" without bad civil aviation credit records, and no his or her abnormalities were found by the throughtype millimeterwave security detector and potential emotional analysis. All the scores are "100," and the comprehensive risk assessment results are "100," belonging to "known passengers," who are handled according to the "fasttrack check" as illustrated in Table 1.
Case 2: Ordinary passengers
As shown in Table 12, the passenger took the plane for the first time in the last 3 years (with the second level score of "0") without any bad credit record. During the check by the millimeterwave security detector, it was found that the passenger carried "suspected liquids exceeding 100 ml" (with the second level score of "60"), and the comprehensive risk assessment result was "87.58," who belonged to "ordinary passengers" and was handled according to "routine check" as illustrated in Table 1.
Case 3: Dangerous passengers (fugitives)
As shown in Table 13, once the passenger was successfully found on the police blacklist of the fugitives after face recognition, all the index scores were reduced to zero, so they were judged as "dangerous passengers." Face recognition system quickly locked the trajectory of the passenger's movement, and related information transferred to the airport police organs for further treatment.
Case 4: Dangerous passengers (nonfugitives)
As shown in Table 14, the passenger took the first flight in 3 years (with a single score of "0") and had no bad credit record. It was found that the passenger carried "suspected explosives" (with the second level score of "0") in the millimeterwave security detector test, and after potential emotional analysis, it was found that the aggression and tension index values exceeded the set threshold (with the second level score of "0"). The comprehensive risk assessment result is "73.4," which belongs to "dangerous passengers" and should be handled according to "special attention" as illustrated in Table 1.
Conclusions
In this paper, a passenger risk assessment scheme based on GDAHP is proposed for graded security check by combining several new security technologies and the large historical data of civil aviation passengers. The passenger differential security check mode, as proved in this work, can bring better travel experience to passengers. Most passengers can avoid the second security check such as open package check and personal examination, shorten the waiting time of passengers queuing and improve the efficiency of security check. At the same time, this mode not only benefits the passengers, but also improves the airport security resources allocation. In fact, the potential danger of most passengers is relatively low. If strict and tedious security checks are carried out, it will undoubtedly increase the investment of airport equipment, personnel and funds, resulting in waste of resources. Safety is the primary task of civil aviation security, and by using a number of new security technologies, this work can improve the efficiency of security check and service quality on the premise of ensuring security.
At present, there are few materials for evaluating passenger risk grade factors, and there are relatively few in actual implementation. Therefore, the applicability and feasibility of the risk classification system proposed in this article can be further studied and optimized in the future to make it suitable for the actual application of the airport. Moreover, due to the limitation of practical conditions, the sample of passenger data collected in this article is small. In future work, it is expected that big data technology will be used to test our proposed method and help improve the accuracy of passenger classification.
Availability of data and materials
Not applicable.
Abbreviations
 5G:

Fifth generation
 AHP:

Analytic hierarchy process
 IoT:

Internet of things
 TSG:

Threat screening game
 D2D:

Devicetodevice communication
 CNN:

Convolutional neural network
References
 1.
W.G. Feng, J. Huang, Early warning for civil aviation security checks based on deep learning. Data Anal. Knowl. Discov. 22(10), 46–53 (2018)
 2.
Q.Q. Cao, Y. Zhao, New progress of American security check between 2016 and 2017. China Public Secur. 53(4), 130–134 (2018)
 3.
X.J. Liu, Review and prospect on civil aviation security check efficiency research. Sci. Technol. Vis. 8(34), 254–256 (2018)
 4.
G.S. Liao, D.M. Wang, Application of block chain technology in differential security inspection. Civ. Aviat. Manag. 6(12), 15–18 (2018)
 5.
S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization with SDR and SDN for 4G/5G networks. IEEE Netw. 29(3), 54–59 (2015)
 6.
N. Zhang, N. Cheng, A.T. Gamage, K. Zhang, J.W. Mark, X. Shen, Cloud assisted HetNets toward 5G wireless networks. IEEE Commun. Mag. 53(6), 59–65 (2015)
 7.
Y. Wu, B. Rong, K. Salehian, G. Gagnon, Cloud transmission: a new spectrumreuse friendly digital terrestrial broadcasting transmission system. IEEE Trans. Broadcast. 58(3), 329–337 (2012)
 8.
B. Matthew, S. Arunesh, S. Aaron, T. Milind, One size does not fit all: a gametheoretic approach for dynamically and effectively screening for threats, in AAAI'16 Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (2016), pp. 425–431
 9.
D.J. Landoll, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments (CRC Press, New York, 2005).
 10.
Risk managementGuidelines, 2018. ISO 31000 : 2018.
 11.
M.G. Stewart, J. Mueller, Terrorism risks and costbenefit analysis of aviation security. Risk Anal. 33(5), 893–908 (2013)
 12.
Q. Huang, Y. Ren, Y.Z. Lin, Application of uncertain type of AHP to condition assessment of cablestayed bridges. J. Southeast Univ. (Engl. Ed.) 23(4), 599–603 (2007)
 13.
A. Ishizaka, A. Labib, Review of the main developments in the analytic hierarchy process. Expert Syst. Appl. 38(11), 14336–14345 (2011)
 14.
K.Y. Chan, C.K. Kwong, Y. Wong, Computational Intelligence Techniques for New Product Design (Springer, Heidelberg, 2012).
 15.
H.B. Bai, N.C. Wang, Research on the selection of scale in AHP, in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (2010)
 16.
A. Ishizaka, D. Balkenborg, T. Kaplan, Influence of aggregation and measurement scale on ranking a compromise alternative in AHP. J. Oper. Res. Soc. 62(4), 700–710 (2011)
 17.
G.Y. Bao, X.L. Lian, M. He et al., Improved twotuple linguistic representation model based on new linguistic evaluation scale. Control Decis. 25(5), 780–784 (2010)
 18.
W.F. Hu, W. Yao, M. Zhou, Comprehensive evaluation on performance of existing residential buildings based on fuzzy and analytic hierarchy process. J. Tongji Univ. (Nat. Sci.) 39(5), 785–790 (2011)
 19.
Y.J. Lv, W.C. Chen, L. Zhong, Research on some problems of the scale of analytic hierarchy process. J. Qiongzhou Univ. 20(5), 1–6 (2013)
 20.
S. Sironen, P. Leskinen, A. Kangas et al., Variation of preference inconsistency when applying ratio and interval scale pairwise comparisons. J. MultiCriteria Decis. Anal. 21(3/4), 183–195 (2014)
 21.
L. Lin, C. Wang, On consistency and ranking of alternatives in uncertain AHP. Nat. Sci. 4(5), 340 (2012)
 22.
W. Zhengtian, W. Min, W. Lizheng, Applying fuzzy matterelement method to evaluating the green degree of ship, in 2010 6th International Conference on Advanced Information Management and Service (IMS), Seoul (2010), pp. 118–121
 23.
K. Mistry, L. Zhang, S.C. Neoh, C.P. Lim, B. Fielding, A microGA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Trans. Cybern. 47(6), 1496–1509 (2017)
 24.
N. Zhang, Z.Y. Li, T.T. Zhou et al., Modeling and application of airport security system efficiency. Model. Simul. 6(3), 170–178 (2017)
 25.
N. AlFalahy, O.Y. Alani, Technologies for 5G networks: challenges and opportunities. IT Prof. 19(1), 12–20 (2017)
 26.
B. Rong, Y. Qian, K. Lu, H. Chen, M. Guizani, Call admission control optimization in WiMAX networks. IEEE Trans. Veh. Technol. 57(4), 2509–2522 (2008)
 27.
N. Chen, B. Rong, X. Zhang, M. Kadoch, Scalable and flexible massive MIMO precoding for 5G HCRAN. IEEE Wirel. Commun. 24(1), 46–52 (2017)
 28.
J.F. Ren, Y. Gao, Summary of research on application of face recognition technology in airport. China New Telecommun. 19(20), 85 (2017)
 29.
J. Li, W. Cao, L. Huang, W.S. Chen, An overview of the millimeter wave human body screening technology and its application. China Civ. Aviat. 289, 53–54 (2019)
 30.
R. He, X. Wu, Z. Sun, T. Tan, Wasserstein CNN: learning invariant features for NIRVIS face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 41(7), 1761–1773 (2019)
 31.
D.Y. Liliana, Emotion recognition from facial expression using deep convolutional neural network. J. Phys. Conf. Ser. 1193(1), 1–5 (2019)
 32.
C. Ding, D. Tao, TrunkBranch ensemble convolutional neural networks for videobased face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 40(4), 1002–1014 (2018)
 33.
T.L. Saaty, L.G. Vargas, Models, Methods, Concepts and Applications of the Analytic Hierarchy Process (Springer, New York, 2001).
 34.
T.L. Saaty, Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 1(1), 83–98 (2008)
 35.
Y.C. Dong, G.Q. Zhang, W.C. Hong et al., Consensus models for AHP group decision making under row geometric mean prioritization method. Decis. Support Syst. 49(3), 281–289 (2010)
 36.
W. Pedrycz, M. Song, Analytic hierarchy process (AHP) in group decision making and its optimization with an allocation of information granularity. IEEE Trans. Fuzzy Syst. 19(3), 527–539 (2011)
Acknowledgements
The authors thank the anonymous reviewers and editors for their efforts in valuable comments and suggestions.
Funding
This research work was funded by the National Key Research and Development Program (2016YFC0800406).
Author information
Affiliations
Contributions
Conceptualization, WC and YH; Methodology, WC and HY; Software, WC and XL; Supervision, WC and JL; Validation, HY and XL; Writing—original draft, WC and YH; Writing—review and editing, WC. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Chen, W., Huang, Y., Yang, H. et al. A passenger risk assessment method based on 5GIoT. J Wireless Com Network 2021, 5 (2021). https://doi.org/10.1186/s1363802001886z
Received:
Accepted:
Published:
Keywords
 Risk assessment
 5GIoT
 Machine learning
 Graded security check
 Analytic hierarchy process (AHP)
 Group decision